Key words. Multipath routing, decentralized load balancer, utility optimization, proportional fairness.

Size: px
Start display at page:

Download "Key words. Multipath routing, decentralized load balancer, utility optimization, proportional fairness."

Transcription

1 DECENTRALIZED PROPORTIONAL LOAD BALANCING J. ANSELMI AND N.S. WALTON Abstract. Load balancing is a powerful technique commonly used in communication and computer networks to improve system performance, robustness and fairness. In this paper, we consider a general model capturing the performance of communication and computer networks, and on top of it we propose a decentralized algorithm for balancing load among multiple network paths. The proposed algorithm is inspired by the modus operandi of the processor-sharing queue and on each network entry point operates as follows: every time a unit of load completes its service on a path, it increases by one unit the load of that path and decreases by one unit the load of a path selected at random with probability proportional to the amount of load on each of the available paths. We develop a dynamical system to argue that our load-balancer achieves a desirable network-wide utility optimization. Key words. Multipath routing, decentralized load balancer, utility optimization, proportional fairness. AMS subject classifications. 68M10, 68W15, 90B18 1. Introduction. We focus on communication and computer networks whose performance (or behavior at equilibrium can be modelled by the solution of an utility maximization problem of the form (1.1 max r R ( Λr U r subject to Λ r C j, j J over Λ r 0, r R, where R denotes the set of network paths (or routes, J denotes the set of network congestible resources (or links, queues, C j denotes the service speed (or capacity of link j, denotes the number of packets (or customers using route r, U r is a strictly-concave function, and the decision variable Λ r, r R, is interpreted as the throughput given by the network to all packets moving ooute r, i.e. the rate at which packets flow ooute r. The value of function U r ( is interpreted as the utility of a packet sent ooute r. The constraints of such optimization can be interpreted as the capacity constraints or the stability region of the network and the form of the utility functions depends on which dynamics or communication protocols packets are forced to follow. Furthermore, within the time scale of interest, the numbers of packets circulating on each route, r R, is considered constant. Knowing the throughput of packets on each route r, that is the unique optimizer of (1.1, one immediately obtains other performance metrics of interest such as the delay experienced by each packet o, which follows by an application of Little s law [24]. In the following, we say that the performance (or behavior of a network is known if the per-route throughputs of that network are known. We will also refer to (1.1 as the single-path utility optimization. The utility maximization (1.1 is known to provide a general model able to approximate the performance achieved by a wide class of both communication and computer Basque Center for Applied Mathematics (BCAM, Al. de Mazarredo 14, Bilbao, Basque Country, Spain; INRIA Bordeaux Sud Ouest, 200 av. de la Vieille Tour, Talence, France (jonatha.anselmi@inria.fr University of Amsterdam, Science Park 904, 1098 XH, Amsterdam, The Netherlands (n.s.walton@uva.nl 1

2 2 J. Anselmi and N.S. Walton networks. In the networking community, it is well accepted that the throughputs achieved by packets in telecommunication networks that implement a form of congestion control, e.g. TCP (Transmission Control Protocol, can be approximated by the unique optimizer of an optimization of the form (1.1 [13, 27, 43]. Similarly, in computer science, the throughputs achieved by customers in data-centers are often modelled by the throughputs of a multiclass BCMP or Kelly queueing network [36, 1], and it is known that the throughputs of such queueing network can be approximated again by the unique optimizer of an optimization of the form (1.1 [33, 39, 2]. Keeping (1.1 as a general framework to model the behavior of communication and computer networks, we are interested in the problem of injecting a form of decentralized load-balancing control for the packets. This can be done by allowing each network entry point to send packets among all of its available routes. Such approach is motivated by the natural fact that communication and computer network resources can send and receive data from multiple paths simultaneously, and that developing such control is currently a desirable feature of strong interest, as it aims at improving performance, fairness and robustness of the network by better exploiting its intrinsic path diversity. There is a vast literature on this subject and we point the reader to Section 1.1 for an overview of the related work. In several cases of practical interest, it is desirable to design a decentralized load-balancing control with the property that the resulting throughputs converge, at equilibrium, to a solution of an utility maximization problem of the form (1.2a maximize U s ( / (1.2b (1.2c (1.2d subject to = Λ r, s S Λ r C j, j J over, Λ r 0, s S, r R, where S denotes the set of network source-destination pairs, = denotes the total number of packets using all routes belonging to s, and the remainder of the notation is as above. Thus, the load-balancer is distributed among all the sourcedestination pairs s, and on each s it aims at maximizing the utility of the total throughput among all the available routes. This is ofteeferred to as resource pooling. Here the individual pathwise constraints of (1.1 are combined and throughput ia optimized over different source-destination pairs. There are several desirable properties in designing a decentralized load-balancer achieving the optimization (1.2; see [16, 31]. For instance, the optimizers of (1.2 can be interpreted as a Nash or Wardrop equilibrium where the delays on the routes of a given source-destination are all equal and minimum. Due to its utilitarian objective, throughputs achieved by (1.2 are fair. We will refer to (1.2 as the multipath utility optimization Related work. During the last decades, decentralized load balancing has been a central theme for different research areas. The objective is to improve the performance, robustness and fairness of a network by better exploiting its intrinsic path diversity. In data-centers, for instance, web or application servers are usually replicated several times [36], are often multi-homed [30] and, due to their large sizes, the network structure has several entry points. In telecommunication networks, smartphones can simultaneously use 3G and WiFi [28], and end hosts of peer-to-peer net-

3 Decentralized Proportional Load Balancing 3 works can usually choose among different download sources, e.g. as in BitTorrent, [8]. This recurrent network structure is ideal for developing decentralized load-balancing schemes. In the networking community, researchers have recently implemented a multipath version of the TCP (Transmission Control Protocol [41, 6], and a myriad of (decentralized load-balancing congestion-control algorithms have been developed during the last decade; see, e.g., [14, 9, 42, 10, 40, 16, 5, 29, 17, 22]. Here an objective is to allocate bandwih that solves a version of the multipath utility optimization (1.2. Necessary and sufficient conditions for achieving the multipath utility optimization are developed in [29]. Convergence to the solution of the multipath utility optimization is usually proven through models based on ordinary differential equations Our Contribution. On top of the general model for network performance (1.1, we propose a decentralized algorithm that balances the amount of packets associated to each network route. On each entry point of the network, our load balancer only uses local information and works as follows: Every time a packet completes on a route: i increase the number of packets on that route by one; ii remove one packet from a route that is selected with probability proportional to the number of packets on that route. Underlying this algorithm, there is the heuristic argument that the dynamics of the number of packets on each route should mimic the dynamics of a Processor-Sharing (PS queue 1 [18] (from the standpoint of each network resource that implements such control. This analogy with the PS queue is intuitively driven by the following coupling argument. When our load balancer increases by one the number of packets in the route where the completion occurred, this corresponds to an arrival event at the processor-sharing queue. Consequently, a packet removal from its route is interpreted as a service event at the queue and, as in the processor-sharing queue, this event occurs at a rate that is proportional to the number of packets in each route. Using differential equations, we develop a mathematical model describing the evolution of the number of packets on each route that is induced by our load balancer. As we describe in Section 3.2, our model assumes that between any two consecutive loadbalancing updates, i.e. steps i and ii above, performed on any source-destination s, the network achieved the (equilibrium throughputs given by the single-path utility optimization (1.1. Though we argue that our qualitative results hold even without it, this time-scale separation argument helps us ieducing the complexity of the underlying mathematical analysis and more importantly allows for an interpretation of the resulting equations. In fact, we will exhibit a Lyapunov function L(t for the proposed dynamical system satisfying the following property: dl = (( Λr D ( nr (( nr D ( Λr where D( denotes the Kulback-Liebler divergence or relative entropy. From this, we understand the effect of our processor-sharing heuristic: our load-balancer can be interpreted as to be equilibrating the relative entropy between the distribution of packets along each route and the distribution of throughputs along these routes. This entropy approach contrasts previous studies of multipath routing, which tend to focus 1 In a PS queue, all jobs are processed simultaneously and each of them takes 1/n of the available capacity, provided that n denotes the number of jobs in the queue.,

4 4 J. Anselmi and N.S. Walton on placing quadratic bound on Lyapunov functions [14, 16] and/or applying Nyquist s stability criterion [9]. Under proportional fairness [13], i.e. U r (Λ r / = log(λ r /, we prove in our maiesult that the throughputs achieved by the packets converge to the solutions of the multipath utility optimization (1.2. Our proof is essentially based on duality arguments connecting the structure of the Lyapunov function L(t to the objective of the multipath utility optimization. Then, we adapt our approach to show that it is possible to design an other load-balancer able to achieve the multipath utility optimization under a general class of utility functions. This follows through an optimization decomposition argument that is similar to the one used in [12]. The remainder of the paper is organized as follows. Section 2 introduces the modeling framework. Section 3 presents our decentralized load-balancer, describes application areas and develops a mathematical model for the dynamics of network packets. Section 4 is devoted to our maiesults (Theorems 4.2 and 4.4, which are proven in Section 5. A number of technical lemmas are deferred to the Appendix for simplicity of exposition. 2. Multipath Utility Optimization. Let the set J, indexed by j, be the set of links. These are the network resources affected by congestion and, depending on the context, can be also interpreted as queues, Internet routers, or web-servers. Packets circulate in the network following giveoutes. A route is an ordered set of links, r = (j 1,..., j kr with j 1,..., j kr J. Thus, k r is the number of links ooute r. The set R is the set of routes. A source-destination, s, is a set of routes, thus s R. Each source-destination contains the set of routes available to a host. We think of hosts as the entry points of the network and can be also interpreted as dispatchers or end users. The set S gives the set of source-destinations. We assume that there are no source-destinations that share a commooute, i.e., s s = when s s. Thus, we can define s(r S as the source-destination to which route r belongs. We assume that there is one host for each source-destination. Let denote the number of packets ooute r R. Correspondingly, n = ( : r R is the number of packets on each route. Let denote the number of packets on source-destination s S. Accordingly, w = ( : s S is the number of packets on each source-destination. Thus, for s S (2.1 =. The strictly positive vector C = (C j : j J gives the capacity (or service rate of each link, i.e. the number of packets served per unit of time in a fully utilized link. Let Λ r denote the throughput (or flow rate or bandwih allocated by the network to the packets ooute r R, and let denote the throughput on source-destination s S. Thus, for s S and j J = Λ r, Λ r C j Proportional Fairness. When a host can distribute packets among multiple routes, one wishes to design a load-balancer maximizing the utility of the total throughput between each source-destination pair, and thus achieving the multi-path utility maximization (1.2. We will first assume that both the optimizations (1.1 and (1.2 have logarithmic utilities, i.e. (2.2 U r (Λ r / = log(λ r /, U s ( / = log( /,

5 Decentralized Proportional Load Balancing 5 for r R and s S respectively. The throughputs achieved with this utility function are called proportionally fair. Several economic and game-theoretic interpretations hold in this case [12, 13, 25, 35, 23, 43]. Communication protocols achieving this optimization objective have been designed and implemented [26, 37, 20]. Furthermore, proportionally fair throughputs approximate the performance of closed multiclass BCMP or Kelly queueing networks [34, 39, 2], which have been used to model the performance of data centers [36]. Summarizing so far, our primary goal is to design a decentralized load-balancer ensuring that the resulting throughputs solve (2.3a Λ r, s S, Λ r C j, j J. max Γ,Λ 0 log s.t. = We refer to problem (2.3 as the multipath proportionally fair optimization. We will achieve this optimization by considering a simple load-balancing mechanism which modifies the single-path proportionally fair optimization: (2.4a max Λ 0 log Λ r r R s.t. Λ r C j, j J. 3. Processor Sharing Load Balancing. We develop a simple decentralized algorithm that balances the amount of packets among multiple routes of a network. Operated at each host, it sends incoming packets along a giveoute with a rate proportional to the number of packets in transfer on that route. This modus operandi is similar to how a Processor-Sharing (PS queue serves different packet classes [18]. The proportion of service devoted to a class in a PS queue is proportional to the number of jobs in that class. Given this analogy, we refer to our algorithm as Processor Sharing Load Balancer (PSLB, which is as follows: Every time a packet completes on a route: i increase the number of packets on that route by one; ii then, remove one packet from a route that is selected with probability proportional to the number of packets on that route. It is clear that PSLB is easy to implement on each host, which only needs to store the amount of packet on each of its routes. Note that the probability of decreasing the number of packets on each route is proportional to the number of packets on each route, as in a PS queue Application areas. There exist at least four scenarios where our algorithm can be implemented: multipath-tcp, data-centers, wireless networks and peer-to-peer networks. We discuss each of these. i Multipath-TCP: Multipath-TCP (MPTCP refers to a set of extensions of TCP (Transmission Control Protocol that allow each connection to use multiple paths simultaneously. MPTCP allows smartphones to simultaneously use 3G and WiFi [28]; it reacts to link failures on a time-scale that is much quicker than that obtained by updating the routing tables of network routers; it increases resource pooling that is where multiple network resources can collectively be seen as a single pooled resource [21, 7]. Due to these potential benefits, the Internet Engineering Task Force (IETF MPTCP working group has recently released three implementations of MPTCP [32]. The first large-scale commercial deployment of MPTCP appeared on September 18th,

6 6 J. Anselmi and N.S. Walton 2013, when Apple released ios 7 [4]. In this setting, our approach aims at balancing the magnitude of the congestion window associated to each network route available to host s given the total congestion window. ii Data Centers: In a data-center, packets are interpreted as http requests, links as Internet servers and each source-destination as the set of routes available to execute a web-application. In practice, end-users submit an http request, read on a browser the result that has been produced by the data-center, and then submit again an other request. Http requests can be assumed to come from a constant number of end-users, and the network performance can be modelled by a closed multiclass BCMP/Kelly queueing network; see, e.g., [36, 1] and references therein. Given their large size, datacenters usually admit multiple entry points, called dispatchers, which can implement a load-balancing mechanism. By doing so and assuming that throughputs without load-balancing can be modelled by an optimization of the form (1.1 (as in, e.g., [1], we show that our load-balancer will make throughputs converge to a solution of an optimization of the form (1.2. iii Wireless Networks. In wireless systems, there are reasons to balance load amongst multiple resources. First, hosts may have access to multiple frequencies in the wireless spectrum and these are usually shared between users. Thus, load balancing is highly relevant in this dynamic spectrum access setting. Further, a wireless host may have access to multiple transmitters whose signal quality will, amongst other factors, depend on the distance between host and the transmitter. This access point selection problem represents a further model where load balancing is required. For an analogous proportional fair load-balancing system and discussion on these systems, see [44]. iv Peer-to-peer networks. Although we refer to transfers between source destination pairs, it is clear from the above examples that a single-source is not required in our modeling setting. The case of peer-to-peer networks gives a further example. Here, a peer may download elements of a file from multiple peers. By exploiting the diversity of peers who share a specific file, users caeceive high and fair download rates. Once again, the traffic must be balanced between multiple routes and thus load-balancing techniques are of importance, see [11] Differential Equation Model. We model the time evolution of the number of packets induced by PSLB through differential equations. Between two consecutive load-balancing updates, we assume that the throughputs allocated to packets by the network are close to Λ(n, i.e., the equilibrium rates achieved by the single-path optimization (1.1. We stress that this is possible because rates converge to such single-path optimization. In other words, we assume that our load-balancer operates at a time-scale that allows the single-path equilibrium rates to be achieved. A packet completion on a route r s will result in a increase in the number of packets on that route. In view of the time-scale separation argument above, the rate allocated by the network to such completions is Λ r (n. Each completion on a source-destinatioesults in a decrease in the congestion of a route with probability proportional to the number of packets on that route. These source-destination completions occur at rate (n and the probability of decrease ooute r is nr. Thus, we model the time evolution of the number of packets in each route obtained when PSLB is used by the following system of ordinary differential equations: for (t 0 (3.1 d = Λ r (n (n,

7 Decentralized Proportional Load Balancing 7 for all r s and for all s S, where n(0 0 is such that (0 = for all s. We refer to any solution n(t of (3.1 as a fluid solution. When each source-destination contains a single route and the total number of packets is kept constant, our model can be compared to the fluid-limit of the flow-level model studied in [3], which was proposed to model the time evolution of connections in a communication network with singlepath congestion control. Before continuing, we observe that a special case of practical interest is a network of parallel servers, which gives a bipartite network structure between hosts and servers. The applications of wireless networks and data centers discussed above are two examples of a parallel server system. In this case, the solution to the proportional fair optimization takes a particularly simple form. Namely, the throughput at route r is proportional to the number of packets (or jobs that have been sent there, i.e., Λ r (n = r :j r n C j, r where j r. In this case, the above differential equation takes a very simple form. 4. Main Convergence Results. Using the differential equation model developed in previous section, we prove our maiesults (Theorems 4.2 and 4.4. In Theorem 4.2, we prove that the throughputs achieved by PSLB converge to a solution of the multipath proportional fair optimization (2.3. In Theorem 4.4, we show that these properties can be also achieved under a wide class of utility functions Multipath Proportional Fair Optimization. We will demonstrate that our load balancer is able to modify the single-path flows, which solve the proportionally fair optimization, into a multipath flow control, which solves the multipath proportional fair optimization. For this purpose, we use the following function (4.1 L(n def = ( log Λ r (n Letting L def = min n 0 L(n subject to = for all s, we show that L(n L is a Lyapunov function for the dynamical system (3.1. The crucial observation about this function is given in the following proposition. Theorem 4.1. following holds (4.2a dl(n(t = [ (n D For each point of differentiability of a fluid solution n(t, the ( (Λr ( s (n ( + D. ( (nr ] (Λ r ( s, (n where, for two probability distributions p s = (p r : r s and q s = (q r : r s, D(p s q s defines the relative entropy (4.3 D (p s q s = p r log p r q r. Note that for two discrete probability distributions p and q on the same support, it is well known, using Jensen s inequality, that D (p q 0 and that D (p q = 0 if and only if p = q. This immediately implies that L(n(t is non-increasing. Remark 1. The symmetric relative entropy D(p s q s + D(q s p s,

8 8 J. Anselmi and N.S. Walton as first introduced by Kullback and Leibler [19], is critical to understanding the convergence of single-path connections to the multi-path optimum. Through the symmetric relative entropy (4.2, PSLB attempts to equate the distribution of packets within the network and the distribution of throughputs along different routes. If these are unequal then the Lyapunov function will decrease further towards its minimum. Through duality arguments presented shortly, we see that the minimum of the Lyapunov function L(n is achieved only at solutions which minimize the multipath proportional fair optimization. As a consequence of the last theorem, we obtain our maiesult, which says that dynamics of (3.1 converge to the multipath proportional fair optimization (2.3. Theorem 4.2. For any fluid solution for which L(n(t is absolutely continuous, the source-destination throughputs converge to Γ the optimal solution to the multipath proportionally fair optimization (2.3, Γ(n(t t Γ. A proof of Theorem 4.1 and Theorem 4.2 can be found in Section Multipath Utility Optimization. Our prior analysis achieved the multipath proportional fair objective. However, in this section we show that it can be generalized to a wide class of utility functions. Through an optimization decomposition argument, it is known that other utility optimizations can be achieved by altering the weights associated with the proportional fair objective [12]. Now, we apply a similar decomposition in order to modify proportional fair single-path flows towards a general multipath utility optimization. First, we introduce some additional notation. For each source destination pair, let U s : R + R be a strictly-increasing continuously-differentiable utility function. We further assume that the function U s( is continuous, strictly increasing and with range (0,. We note that this assumption holds for all the weighted α-fair allocations with α < 1 [27]. Given this assumption, we define the function g s ( = such that (4.4 g 1 s ( = U s(, which is well-defined since U s( is increasing. We interpret g s ( as the throughput source-destination pair s would expect given that it has utility function U s and given that its current number of packets from source to destination is. From this interpretation, we now consider a load balancer who obeys the following dynamics (4.5 d = Λ r (n g s (, where Λ r (n is the solution to the single-path proportionally fair optimization problem (2.4. In view of the fluid model (3.1, we note that these rates are a form of processorsharing load balancing: once again, we increment the number of packets for each packet arrival and decrement it proportionally to the number of packets present in each of the available routes. The only difference to our prior analysis is that the number of packets decreases at rate g s ( rather than, so the number of packets between each source-destination pair is no longer conserved. Summing over r s, we

9 Decentralized Proportional Load Balancing 9 see that must vary dynamically according to the equations d = (n g s (, where (n = Λ s (n, =. We want to control the number of packets between each source destination pair so that the logarithm in the proportionally fair optimization is replaced by the more general utility function U s. With this in mind, we consider the function (4.6 G s ( = max 0 { log U s ( }. With the addition of function G s and motivated by the structure of (4.1, we define the following function (4.7 H(n = log Λ r (n + G s (. r R Letting H def = min n 0 H(n subject to = for all s, we show that H(n H is a Lyapunov function for the dynamical system (4.5. Once again, the function H balances the relative entropy between different routes of the network. This is shown in the following proposition, which is proven in Section 5.2. Theorem 4.3. For each point of differentiability of a fluid solution for (4.5, n(t, the following holds (4.8 dh(n(t = ( (Λr ( D ( (nr g s ( D ( ( g s ( log log g s (. (Λ r Using that the logarithm is increasing, the term (4.8 is negative. Furthermore, since D( 0, this means that the derivative of the entropy function H(n(t is negative. As a consequence of Theorem 4.3 and adapting the arguments in the proof of Theorem 4.2, we can prove that the single-path flows converge to solutions of the multipath utility optimization (1.2. Theorem 4.4. For any fluid solution for which H(n(t is absolutely continuous and w(t is bounded from zero, the source-destination throughputs converge to Γ the optimal solution to the multipath utility optimization (1.2, Γ(n(t t Γ. A proof of Theorem 4.3 and 4.4 can be found in Section Proofs of Main Results. We present proofs for our maiesults: Theorem 4.2 and Theorem 4.4. For simplicity, we often drop the dependency on n when referring to quantities Λ r (n and (n.

10 10 J. Anselmi and N.S. Walton 5.1. Proof of Theorem 4.1 and Theorem 4.2. We require the following lemma which follows by somewhat standard calculus arguments, for instance see [38, Lemma 2] for a proof. Lemma 5.1. If > 0 then L(n ( nr = log + 1. Λ r (n With this, we can prove Theorem 4.1. Proof. [Proof of Theorem 4.1] For the following sequence of equalities, we use the shorthand that n = n(t, L = L(n(t and Γ = Γ(n(t: (5.1a (5.1b (5.1c dl = d r R L = >0 ( Λ r ( Λ r = log w s Λ r = Λ r log Λ r Γ s = ( (Λr D ( ( log D n r + 1 Λ r log Λ r ( (nr (Λ r In the first two equalities above, we apply the chaiule and the definition of the derivatives of n and L, from fluid equations (3.1 and Lemma 5.1. In the equality (5.1a, we cancel terms and observe that we can exclude terms where = 0 because d = 0 and Λ r (n = 0 must hold at times when = 0. Then, in equalities (5.1b and (5.1c we add and subtract terms log and observe that the terms summed are relative entropy terms. To prove Theorem 4.2, we will need the following technical lemma, which is straightforward to verify and gives first order properties for our Lyapunov function L. Lemma 5.2. L(n is continuous and convex and thus N, the set of the optimal solutions to (5.1, is compact and convex. A proof of Lemma 5.2 can be found in the Appendix. The following Lemma bounds terms (n. Lemma 5.3. a The function L(n can be characterized through its dual as follows (5.2 L(n = max log q j q j C j + log. q 0 r R j r j J r R b There exists a constant Γ min > 0 not dependent on n such that for all n and each s S we have (n Γ min. A proof of Lemma 5.3 can be found in the Appendix. The following lemma finds a dual description for the Lyapunov function L and also equates the minimized Lyapunov function with the multipath proportionally fair optimization. Lemma 5.4. The minimum of Lyapunov function L(elates to the multi-path proportionally fair optimization as follows min n 0 L(n subject to =, s S

11 = max Γ,Λ 0 Decentralized Proportional Load Balancing 11 Moreover, L(n is minimal if and only if log subject to = Λ r, s S. (5.3 = Λ r(n (n for each r R (with r s such that > 0. Proof. We have the following equalities min n 0 = min min n 0 Λ 0 = min min Λ 0 n 0 = min min Λ 0 n 0 L(n subject to = min Λ 0 subject to =, n r log Λ r log Λ r s.t. s S =, j J, s S Λ r C j, s.t. =, Λ r C j, j J, s S n ( r nr Γ s log log Λ r =, Λ r C j, log s.t. Λ r C j, Λ r = Λ r = The first equality follows by the definition of L(n; in the second equality, we interchange the order of minimization; in the third, we add and substract the multipath proportionally-fair objective; in the final equality, we minimize over n and observe that the relative entropy term in the objective is minimized to zero when the vector n is proportional to Λ. Now we show that (5.3 is a condition for optimality of L(n. Consider the function (5.4 L(n, Λ = log. Λ r It is clear that L(n, Λ is convex. The minimum of L(n, Λ over Λ (satisfying the network capacity constraints Λ r C j, j J is achieved at Λ(n and the minimum attained at L(n. The minimum of L(n, Λ over n (satisfying the packet constraints =, is achieved when Λ r. Since we are minimizing a convex function over a product space, its minimum is the intersection of the marginal minimality conditions, i.e. L(n, Λ and thus L(n is minimized iff Λr = Λ r (n, for r R and, for all r s, Λ r (n (n =. The proof of Theorem 4.2 is now fairly straight-forward.

12 12 J. Anselmi and N.S. Walton Proof. [Proof of Theorem 4.2] We let L be the minimal value of L(n over n with =, s S. The last lemma states that (5.5 L(n = L iff = Λ r(n (n. From Proposition 4.1, we have that dl = ( (Λr D ( ( (nr D (Λ r. Thus, as the relative entropy D(p q = 0 iff p = q, we can combine the last two displays to give that (5.6 dl = 0 iff Λ r (n (n =, r s, s S iff L(n = L. So L(n(t is decreasing unless n(t achieves the minimum of L(n. Suppose that L(n(t decreases to some value L (which may or may not equal L. There must be a sequence of times {t k } k N such that dl(t k 0 as t k. By Lemma 5.3b, it can not be that (n(t k 0 as k, so for this sequence of times it must be that ( (nr (t k (5.7 D (Λ r (t k (t k 0. k Thus, by continuity of the relative entropy at 0, any limit point, n, Λ, Γ of the sequences n(t k, Λ(n(t k, Γ(n(t k must satisfy Λ r Γ s = n r, for all r s, s S. Thus the minimum of L(n(t must be the optimal value L = L. So L(n(t converges to L, we nohow that Γ(n(t converges to Γ. Observe L(n(t L = ( nr (t (n(t (t log + log Γ s log( (n(t w s Λ r (n(t 0, log Γ s log( (n(t where in the first inequality, above, we use the positivity of the relative entropy. So since L(n(t L converges to 0, and since Γ s log is continuous and (n(t is feasible for each t, it must be that, for s S, (5.8 (n(t t Γ s, as required.

13 Decentralized Proportional Load Balancing Proof of Theorem 4.3 and Theorem 4.4. Next lemma is a consequence of Fenchel duality and relates the function G s given in (4.6 with the utility function U s and g s in (4.4. The lemma also gives the derivative of our Lyapunov function. Lemma 5.5. a The function G s ( is convex. The maximization for G s ( given by (4.6 is optimized by g s (. The function G s is differentiable with derivative (5.9 G s( = log g s (. Further, (5.10 U s ( = min 0 {G s( log }. b The partial derivatives of H are given by the expression ( H nr (5.11 = log + log g s (. Λ r (n A proof of Lemma 5.5 can be found in the Appendix. With this lemma in place, we can prove Theorem 4.3. Proof. [Proof of Theorem 4.3] We differentiate H(n(t with respect to t. In the equalities below, we use the shorthand notation w = w(t n = n(t, Λ = Λ(n(t and Γ = Γ(n(t for simplicity: (5.12a dh = d H = r R r R = + Λ r log ( nr Λ r + Λ r G s( r R = + ( Λ r nr log Γ s Λ r log + ( Λ r g s ( ( ( nr log Λ r g s ( log g s ( G s( + G s( ( nr g s ( log w s g s ( log + Λ r ( nr Λ r G s( g s ( G s( (5.12b = ( (Λr ( D ( (nr (Λ r g s ( D ( ( g s ( log log g s (. In the second equality, we used Lemma 5.5.b. In (5.12a, we have added terms log and multiplied/divided by to express summands in terms of the relative entropy in (5.12b. In (5.12b, we have also used (5.9. We let H be the minimal value of H(n over n with =, s S. Next lemma extends Lemma 5.4. Lemma 5.6. The minimum of H(elates to the multi-path utility optimization as follows H(n subject to =, s S min n 0,w 0

14 14 J. Anselmi and N.S. Walton = max Γ,Λ 0 U s ( subject to = Moreover, H(n is minimal if and only if Λ r, s S, Λ r C j, j J. (5.13 = Λ r(n (n for each r R (with r s such that > 0 and (5.14 g s ( = (n for each s S. A proof of Lemma 5.6 can be found in the Appendix. With Lemma 5.6 we can prove Theorem 4.4. Proof. [Proof of Theorem 4.4] We let H be the minimal value of H(n over n. Last lemma says that (5.15 H(n = H iff g s ( = (n and = Λ r(n (n, > 0. From Theorem 4.3 we have that (5.16a dh(n(t (5.16b = ( (Λr ( D ( (nr g s ( D ( ( g s ( log log g s (. (Λ r It is clear that dh is negative and combining the last two displays, (5.15 and (5.16, we have that (5.17 dh = 0 iff g s( = (n and = Λ r(n (n, > 0. So H(n(t is decreasing unless n(t achieves the minimum of H(n. Suppose that H(n(t decreases to some value H (which may or may not equal H. There must be a sequence of times {t k } k N such that dh(t k 0 as t k. Since w(t is bounded from zero, it can not be that (n(t k 0 as k, so for this sequence of times it must be that ( (nr (t k (5.18 D (Λ r (t k (t k 0. k and (5.19 ( ( (t k g s ( (t k log (t k log g s ( (t k 0. k Thus, by continuity of relative entropy at 0, any limit point, n, Λ, Γ of the sequences n(t k, Λ(n(t k, Γ(n(t k must satisfy Λ r Γ s = n r and g s ( = (n

15 Decentralized Proportional Load Balancing 15 for all r s, s S. Thus the decreasing process H(t must be decrease to the minimum it value H. Finally, to consider the convergence of the processes n(t, w(t, Λ(t and Γ(t, we note that H(t = H(n(t, w(t, Λ(t. for the continuous convex function H given by (7.10. H(n, w, Λ = log + G s (. w s Λ r It is clear that H has compact level sets and so must converge n(t, w(t and Λ(t must converge to the arguments minimizing H over =, for s S, r j Λ r C j, j J. As a consequence, Γ(t must converge to the unique solution to the the optimization (1.2. So H(n(t converges to H, we nohow that Γ(n(t converges to Γ. Observe H(n(t H = ( nr (t (n(t (t log + U s (Γ w s Λ r (n(t s log( (n(t 0. U s (Γ s log( (n(t So since H(n(t H converges to 0, and since Γ s log is continuous, it must be that, for s S, (5.20 (n(t t Γ s, as required. 6. Acknowledgments. The work of Jonatha Anselmi has been supported by grant MTM (Ministerio de Ciencia e Innovación, Spain and grant SA- 2012/00331 of the Department of Industry, Innovation, Trade and Tourism (Basque Government, which also sponsored a one-month visit of Neil Walton to the Basque Center for Applied Mathematics (BCAM. The work of Neil Walton is fund by the VENI research programme, which is financed by the Netherlands Organisation for Scientific Research (NWO. REFERENCES [1] J. Anselmi and G. Casale. Heavy-traffic revenue maximization in parallel multiclass queues. Perform. Eval., 70(10: , Oct [2] J. Anselmi, B. D Auria, and N. Walton. Closed queueing networks under congestion: Nonbottleneck independence and bottleneck convergence. Math. Oper. Res., 38(3: , Aug [3] T. Bonald and L. Massoulié. Impact of fairness on internet performance. Proc. of ACM Sigmetrics, 29:82 91, [4] O. Bonaventure. Apple seems to also believe in multipath tcp, [5] Y. Cao, M. Xu, and X. Fu. Delay-based congestion control for multipath tcp. In Proceedings of the th IEEE International Conference on Network Protocols (ICNP, ICNP 12, pages 1 10, Washington, DC, USA, IEEE Computer Society.

16 16 J. Anselmi and N.S. Walton [6] A. Ford, C. Raiciu, M. Handley, and O. Bonaventure. Tcp extensions for multipath operation with multiple addresses, January RFC [7] R. J. Gibbens, F. P. Kelly, and P. B. Key. Dynamic alternative routing. Routing in communications networks, pages 13 47, [8] T. J. Hacker, B. D. Athey, and B. Noble. The end-to-end performance effects of parallel tcp sockets on a lossy wide-area network. IPDPS 02, page 314, Washington, DC, USA, IEEE Computer Society. [9] H. Han, S. Shakkottai, C. V. Hollot, R. Srikant, and D. Towsley. Multi-path tcp: A joint congestion control and routing scheme to exploit path diversity on the internet. IEEE/ACM Trans. Networking, 14(6: , [10] M. Honda, Y. Nishida, L. Eggert, P. Sarolahti, and H. Tokuda. Multipath congestion control for shared bottleneck. In 7th International Workshop on Protocols for Future, Large-Scale and Diverse Network Transports (PFLDNeT, [11] D. R. Karger and M. Ruhl. Simple efficient load balancing algorithms for peer-to-peer systems. In Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures, pages ACM, [12] F. P. Kelly. Charging and rate control for elastic traffic. European Transactions on Telecommunications, 8:33 37, [13] F. P. Kelly, A. K. Maulloo, and D. K. H. Tan. Rate control in communication networks: shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49: , [14] F. P. Kelly and T. Voice. Stability of end-to-end algorithms for joint routing and rate control. SIGCOMM Comput. Commun. Rev., 35(2:5 12, [15] F. P. Kelly and R. J. Williams. Fluid model for a network operating under a fair bandwihsharing policy. Ann. Appl. Probab., 14: , [16] P. Key, L. Massoulié, and D. Towsley. Path selection and multipath congestion control. In In Proc. IEEE INFOCOM, [17] R. Khalili, N. Gast, M. Popovic, and J.-Y. L. Boudec. Mptcp is not pareto-optimal: Performance issues and a possible solution. IEEE/ACM Trans. Netw., 21(5: , [18] L. Kleinrock. Time-shared systems: a theoretical treatment. J. ACM, 14(2: , Apr [19] S. Kullback and R. A. Leibler. On information and sufficiency. Ann. Math. Statistics, 22:79 86, [20] H. Kushner and P. Whiting. Convergence of proportional-fair sharing algorithms under general conditions. Wireless Communications, IEEE Transactions on, 3(4: , [21] C. N. Laws. Resource pooling in queueing networks with dynamic routing. Advances in Applied Probability, 24(3:pp , [22] T.-A. Le. Improving the performance of multipath congestion control over wireless networks. In Advanced Technologies for Communications (ATC, 2013 International Conference on, pages 60 65, Oct [23] X. Lin and N. Shroff. Utility maximization for communication networks with multipath routing. Automatic Control, IEEE Transactions on, 51(5: , May [24] J. Little. A proof of the queueing formula L = λw. Operations Research, pages 9: , [25] S. H. Low and D. E. Lapsley. Optimization flow control, i: Basic algorithm and convergence. IEEE/ACM TRANSACTIONS ON NETWORKING, 7(6: , [26] S. H. Low, L. L. Peterson, and L. Wang. Understanding tcp vegas: a duality model. Journal of the ACM (JACM, 49(2: , [27] J. Mo and J. Walrand. Fair end-to-end window-based congestion control. IEEE/ACM Trans. Networking, 8: , [28] C. Paasch, G. Detal, F. Duchene, C. Raiciu, and O. Bonaventure. Exploring mobile/wifi handover with multipath tcp. In Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design, CellNet 12, pages 31 36, New York, NY, USA, ACM. [29] Q. Peng, A. Walid, and S. H. Low. Multipath tcp algorithms: theory and design. SIGMETRICS 13, pages , New York, NY, USA, ACM. [30] C. Raiciu, S. Barre, C. Pluntke, A. Greenhalgh, D. Wischik, and M. Handley. Improving datacenter performance and robustness with multipath tcp. SIGCOMM 11, pages , New York, NY, USA, ACM. [31] C. Raiciu, M. Handley, and D. Wischik. Coupled congestion control for multipath transport protocols. RFC 6356, [32] C. Raiciu, C. Paasch, S. Barré, A. Ford, M. Honda, F. Duchene, O. Bonaventure, and M. Han-

17 Decentralized Proportional Load Balancing 17 dley. How hard can it be? designing and implementing a deployable multipath tcp. In USENIX Symposium of Networked Systems Design and Implementation (NSDI 12, San Jose (CA, [33] P. Schweitzer. Bottleneck determination in networks of queues. Proc. ORSA/TIMS Special Interest Conf on Appl. Probab. - Comput. Sci., The Interface, Boca Raton, FLA, pages , [34] P. J. Schweitzer. Approximate analysis of multiclass closed networks of queues. Proceedings of the international conference on stochastic control and optimization, [35] R. Srikant. The Mathematics of Internet Congestion Control. Birkhauser, [36] B. Urgaonkar, G. Pacifici, P. Shenoy, M. Spreitzer, and A. Tantawi. An analytical model for multi-tier internet services and its applications. ACM SIGMETRICS, pages , New York, NY, USA, ACM. [37] P. Viswanath, D. Tse, and R. Laroia. Opportunistic beamforming using dumb antennas. Information Theory, IEEE Transactions on, 48(6: , [38] N. Walton. Concave switching in single and multihop networks. In SIGMETERICS. ACM, [39] N. S. Walton. Proportional fairness and its relationship with multi-class queueing networks. Ann. Appl. Probab., 22(6: , [40] W.-H. Wang, M. Palaniswami, and S. H. Low. Optimal flow control and routing in multi-path networks. Perform. Eval., 52(2-3: , Apr [41] D. Wischik, M. Handley, and M. B. Braun. The resource pooling principle. ACM SIGCOMM Computer Communication Review, 38(5:47 52, [42] D. Wischik, C. Raiciu, A. Greenhalgh, and M. Handley. Design, implementation and evaluation of congestion control for multipath tcp. In Proceedings of the 8th USENIX conference on Networked systems design and implementation, NSDI 11, pages 8 8, Berkeley, CA, USA, USENIX Association. [43] Y. Yi and M. Chiang. Stochastic network utility maximisation. European Transactions on Telecommunications, 19(4: , [44] S.-Y. Yun and A. Proutiere. Distributed load balancing in heterogeneous systems. CoRR, abs/ , Proof of Additional Lemmas. Proof. [Proof of Lemma 5.2] To prove that L(n is convex, we use the dual formulation proven in Lemma 5.4. Let D(n, q be the objective of the dual function (5.2. Observe D(n, q is linear in n. For probabilities p = (p 0, p 1 with p 0 + p 1 = 1 and for two vectors n 0, n 1 R R +, we define n p = p 0 n 0 + p 1 n 1. We have L(n p { = max q 0 D(np, q = max p 0 D(n 0, q + p 1 D(n 1, q } q 0 p 0 { max D(n 0, q } + p 1 { max D(n 1, q } = p 0 L(n 0 + p 1 L(n 1. q 0 q 0 Thus, we see that L(n is a convex function. We consider the continuity of L(n. Firstly, it is proven that n Λ r (n is a continuous function for > 0, see [15, Lemma A.3]. Thus each summand, r, in the above expression is continuous for > 0. However, the case where = 0 remains. Since Λ r (n C max and by bound (7.7 proven in Lemma 5.4, (7.1 log C max log Λ r(n Λ r (n log w max C min. Thus, lim nr 0 log = 0, which means that the summands of L(n are also continuous at = 0. Therefore, L(n is continuous because it is the sum of continuous functions. Finally, we note that the set of feasible values of n belongs to a compact set, so the set of optimal solutions is bounded and since L(n is convex continuous the set of optimal solutions is also closed and convex.

18 18 J. Anselmi and N.S. Walton Proof. [Proof of Lemma 5.3] a The function L(n is the solution to the concave optimization L(n = min ( Λr log s.t. Λ r C j, j J over Λ r 0, r R. n r r We calculate the dual of this optimization. After adding slack variables z j and Lagrange multipliers q j, the Lagrangian of this optimization is (7.3 r ( Λr w s log j j r q j ( C j Λ r z j. We minimize such Lagrangian. As the slack variables are positive, it is clear that a finite solution q j must be positive for each j J, and by complementary slackness q j z j = 0. Differentiating with respect to Λ r, we see that the Lagrangian of this optimization is minimized when (7.4 = q j. Λ r j r Substituting this optimality condition back in to the Lagrangian (7.3, we see that the dual of the optimization is ( max log q j q j C j + log. q 0 r j r j r s The primal problem, (7.2, satisfies Slater s condition and so is Strong Lagrangian. Hence, (5.2 holds. b We first place some bounds on the dual formulation proved above. The partial derivative of the objective, with respect to q j for any j r, is (7.5 n r j r q C j. j For an optimal choice of q this quantity must be negative or equal to zero if q j > 0. However, if we take q such that (7.6 q j > w max C min then, (7.5 is negative. Thus, it must be that (7.7 Λ r (n = j r q j w max C min The equality holds by the optimality condition (7.6 holding. for the optimal q. The lowerbound is achieved by noting that Λ r (n C max for all n and r. For each s, there must exists some route such that ws s and certainly (n Λ r (n for each r s. Applying this to the above upper-bound derived, we have that s (n Λ r (n w max. C min

19 Decentralized Proportional Load Balancing 19 Rearranging gives, (n wmax s C min =: Γ min, as required. Proof. [Proof of Lemma 5.5] a By the definition of G s ( (see (4.6, we have (7.8 G s ( = max 0 { log U s ( } = max γ s R {γ s U s (e γs } Thus, G s ( is the Legendre-Fenchel transform of the convex function U s (e γs and thus it is convex. The objective γ s U s (e γs is concave provided the function U s (e γs is convex, which is equivalent to our assumption that U s(γ s is increasing. Differentiating this objective, we see that optimality is achieved by the satisfying = U s(γ s. In other words, the optimum for G s ( is achieved by = g s (. Next, we see that we can bound the derivative of G s from the right as follows G s ( + h G s ( = ( + h log g s ( + h U s (g s ( + h log(g s ( + U s (g s ( ( + h log(g s ( U s (g s ( log(g s ( + U s (g s ( = h log(g s (. By a symmetric argument we have h log(g s ( +h G s ( +h G s (. Dividing by h and by the continuity of the function g s, we have from that these bounds give (7.9 G s( = log g s (. This gives the derivative of G s. Next, recall that G s ( is the Legendre-Fenchel transform of the convex function U s (e γs, see (7.8. Thus, Legendre-Fenchel duality holds and we can see that U s (e γs = max { γ s G s ( }. And so U s ( = min ws {G s ( log }. This proves part a. b We proceed in a similar manner to Lemma 5.1. We have H(n = r R log r R log Λ r (n log + G s (. Differentiating the first two terms using standard arguments, differentiating the third term as in Lemma 5.1, and using (7.9, we get (5.11. Proof. [Proof of Lemma 5.6] We minimize H(n. For this we consider the following sequence of equalities min n 0,w 0 = min H(n subject to min min w 0 n 0: Λ,Γ 0: nr=ws Λs=Γs r j Λr Cj = min min min Λ,Γ 0: w 0 n 0: Λs=Γs nr=ws r j Λr Cj = min Λ,Γ 0: w 0 Λs=Γs r j Λr Cj =, s S log + G s ( Λ r r R min {G s ( log } log + {G s ( log } Λ r

20 20 J. Anselmi and N.S. Walton = min Λ,Γ 0 U s ( subject to Λ r C j, j J, r j Λ s =, s S. In the first equality above, we introduce the optimization taken over Λ; in the second equality, we reorder the minimization and add and subtract relevant terms; in the third, we minimize the above relative entropy term to zero; in the forth we take the Fenchel transform of G s ( to obtain U s and the required optimization. The function (7.10 H(n, w, Λ = log + G s (. w s Λ r is convex over (Λ r : r R and ( : r R and ( : s S satisfying =, for s S. Minimizing over Λ satisfying network capacity constraints r j Λ r C j, j J, we arrive at the proportionally fair optimization, Λ(n, i.e. H(n = H (n, w, Λ(n. Minimizing over (as in the third equality above we obtain the condition (7.11 = Λ r for each r R (with r s such that > 0. Further minimizing over we obtain the condition (7.12 g s ( = (n. Together we see that the minimality condition for H and thus for H are (5.13 and (5.14.

A Processor-Sharing Heuristic for Multipath Congestion Control

A Processor-Sharing Heuristic for Multipath Congestion Control A Processor-Sharing Heuristic for Multipath Congestion Control Jonatha Anselmi, Bernardo D Auria 2 and Neil Walton 3 Abstract Protocols are currently being designed where a connection can simultaneously

More information

Modelling multi-path problems

Modelling multi-path problems 1 Modelling multi-path problems Richard Gibbens Computer Laboratory, University of Cambridge 2nd Annual Conference on Information Sciences and Systems Princeton University 19 21 March 2 2 Multi-path flow

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Concave switching in single-hop and multihop networks

Concave switching in single-hop and multihop networks Queueing Syst (2015) 81:265 299 DOI 10.1007/s11134-015-9447-9 Concave switching in single-hop and multihop networks Neil Walton 1 Received: 21 July 2014 / Revised: 17 April 2015 / Published online: 23

More information

Resource Allocation and Pricing. R. Srikant University of Illinois

Resource Allocation and Pricing. R. Srikant University of Illinois Resource Allocation and Pricing R. Srikant University of Illinois References The Mathematics of Internet Congestion Control, Birkhauser, 2004. Pricing: Kelly Distributed Resource Allocation: Kelly, Mauloo

More information

Performance Analysis of Priority Queueing Schemes in Internet Routers

Performance Analysis of Priority Queueing Schemes in Internet Routers Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab

More information

Utility, Fairness and Rate Allocation

Utility, Fairness and Rate Allocation Utility, Fairness and Rate Allocation Laila Daniel and Krishnan Narayanan 11th March 2013 Outline of the talk A rate allocation example Fairness criteria and their formulation as utilities Convex optimization

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

Concise Paper: Deconstructing MPTCP Performance

Concise Paper: Deconstructing MPTCP Performance 04 IEEE nd International Conference on Network Protocols Concise Paper: Deconstructing MPTCP Performance Behnaz Arzani, Alexander Gurney, Sitian Cheng, Roch Guerin and Boon Thau Loo University Of Pennsylvania

More information

Efficiency and Braess Paradox under Pricing

Efficiency and Braess Paradox under Pricing Efficiency and Braess Paradox under Pricing Asuman Ozdaglar Joint work with Xin Huang, [EECS, MIT], Daron Acemoglu [Economics, MIT] October, 2004 Electrical Engineering and Computer Science Dept. Massachusetts

More information

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Pierre Coucheney, Corinne Touati, Bruno Gaujal INRIA Alcatel-Lucent, LIG Infocom 2009 Pierre Coucheney (INRIA)

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Rate Control in Communication Networks

Rate Control in Communication Networks From Models to Algorithms Department of Computer Science & Engineering The Chinese University of Hong Kong February 29, 2008 Outline Preliminaries 1 Preliminaries Convex Optimization TCP Congestion Control

More information

A Generalized FAST TCP Scheme

A Generalized FAST TCP Scheme A Generalized FAST TCP Scheme Cao Yuan a, Liansheng Tan a,b, Lachlan L. H. Andrew c, Wei Zhang a, Moshe Zukerman d,, a Department of Computer Science, Central China Normal University, Wuhan 430079, P.R.

More information

Congestion In Large Balanced Fair Links

Congestion In Large Balanced Fair Links Congestion In Large Balanced Fair Links Thomas Bonald (Telecom Paris-Tech), Jean-Paul Haddad (Ernst and Young) and Ravi R. Mazumdar (Waterloo) ITC 2011, San Francisco Introduction File transfers compose

More information

arxiv:math/ v1 [math.pr] 5 Jul 2004

arxiv:math/ v1 [math.pr] 5 Jul 2004 The Annals of Applied Probability 2004, Vol. 14, No. 3, 1055 1083 DOI: 10.1214/105051604000000224 c Institute of Mathematical Statistics, 2004 arxiv:math/0407057v1 [math.pr] 5 Jul 2004 FLUID MODEL FOR

More information

COMP9334: Capacity Planning of Computer Systems and Networks

COMP9334: Capacity Planning of Computer Systems and Networks COMP9334: Capacity Planning of Computer Systems and Networks Week 2: Operational analysis Lecturer: Prof. Sanjay Jha NETWORKS RESEARCH GROUP, CSE, UNSW Operational analysis Operational: Collect performance

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

arxiv: v1 [cs.sy] 10 Apr 2014

arxiv: v1 [cs.sy] 10 Apr 2014 Concave Switching in Single and Multihop Networks arxiv:1404.2725v1 [cs.sy] 10 Apr 2014 Neil Walton 1 1 University of Amsterdam, n.s.walton@uva.nl Abstract Switched queueing networks model wireless networks,

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Routing. Topics: 6.976/ESD.937 1

Routing. Topics: 6.976/ESD.937 1 Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution

More information

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2002 A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Solving Dual Problems

Solving Dual Problems Lecture 20 Solving Dual Problems We consider a constrained problem where, in addition to the constraint set X, there are also inequality and linear equality constraints. Specifically the minimization problem

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

Charging and rate control for elastic traffic

Charging and rate control for elastic traffic Charging and rate control for elastic traffic Frank Kelly University of Cambridge Abstract This paper addresses the issues of charging, rate control and routing for a communication network carrying elastic

More information

LBMP: A Logarithm-Barrier-based Multipath Protocol for Internet Traffic Management

LBMP: A Logarithm-Barrier-based Multipath Protocol for Internet Traffic Management LBMP: A Logarithm-Barrier-based Multipath Protocol for Internet Traffic Management Ke Xu Department of Computer Science, Tsinghua University, Beijing, China Email: xuke@tsinghua.edu.cn Hongying Liu Department

More information

MPTCP is not Pareto-Optimal: Performance Issues and a Possible Solution

MPTCP is not Pareto-Optimal: Performance Issues and a Possible Solution MPTCP is not Pareto-Optimal: Performance Issues and a Possible Solution Ramin Khalili, Nicolas Gast, Miroslav Popovic, Jean-Yves Le Boudec To cite this version: Ramin Khalili, Nicolas Gast, Miroslav Popovic,

More information

Combining Opportunistic and Size-Based Scheduling in Wireless Systems

Combining Opportunistic and Size-Based Scheduling in Wireless Systems Combining Opportunistic and Size-Based Scheduling in Wireless Systems Pasi Lassila TKK Helsinki University of Technology P.O.Box 3, FI-15 TKK, Finland Pasi.Lassila@tkk.fi Samuli Aalto TKK Helsinki University

More information

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Multipath TCP: Analysis and Design

Multipath TCP: Analysis and Design Multipath TCP: Analysis and Design Qiuyu Peng, Anwar Walid, Steven H. Low Abstract Multi-path TCP (MP-TCP) has the potential to greatly improve application performance by using multiple paths transparently.

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control UMass Computer Science Technical Report UM-CS-2011-005 Bo Jiang 1, Yan Cai 2, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

SINCE the passage of the Telecommunications Act in 1996,

SINCE the passage of the Telecommunications Act in 1996, JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 20XX 1 Partially Optimal Routing Daron Acemoglu, Ramesh Johari, Member, IEEE, Asuman Ozdaglar, Member, IEEE Abstract Most large-scale

More information

Price Competition with Elastic Traffic

Price Competition with Elastic Traffic Price Competition with Elastic Traffic Asuman Ozdaglar Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology August 7, 2006 Abstract In this paper, we present

More information

Some results on max-min fair routing

Some results on max-min fair routing Some results on max-min fair routing Dritan Nace, Linh Nhat Doan University of Technology of Compiegne. Laboratory Heudiasyc UMR CNRS 6599, 60205 Compiègne Cedex, France. Phone: 00 33 344234302, fax: 00

More information

Balia (Balanced linked adaptation)

Balia (Balanced linked adaptation) Balia (Balanced linked adaptation) A new MPTCP congestion control algorithm Anwar Walid Jaehyun Hwang Qiuyu Peng Steven Low July 2014 MPTCP Congestion Control (IETF RFC 6824) How to control congestion

More information

Utility-Maximizing Scheduling for Stochastic Processing Networks

Utility-Maximizing Scheduling for Stochastic Processing Networks Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing

More information

Scheduling: Queues & Computation

Scheduling: Queues & Computation Scheduling: Queues Computation achieving baseline performance efficiently Devavrat Shah LIDS, MIT Outline Two models switched network and bandwidth sharing Scheduling: desirable performance queue-size

More information

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem:

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem: CDS270 Maryam Fazel Lecture 2 Topics from Optimization and Duality Motivation network utility maximization (NUM) problem: consider a network with S sources (users), each sending one flow at rate x s, through

More information

The Multi-Path Utility Maximization Problem

The Multi-Path Utility Maximization Problem The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract

More information

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control Bo Jiang 1, Yan Cai, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu ycai@ecs.umass.edu University of Massachusetts,

More information

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,

More information

Nash Equilibria for Combined Flow Control and Routing in Networks: Asymptotic Behavior for a Large Number of Users

Nash Equilibria for Combined Flow Control and Routing in Networks: Asymptotic Behavior for a Large Number of Users IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 47, NO. 6, JUNE 2002 917 Nash Equilibria for Combined Flow Control and Routing in Networks: Asymptotic Behavior for a Large Number of Users Eitan Altman, Senior

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

Congestion Control. Topics

Congestion Control. Topics Congestion Control Topics Congestion control what & why? Current congestion control algorithms TCP and UDP Ideal congestion control Resource allocation Distributed algorithms Relation current algorithms

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Network Optimization and Control

Network Optimization and Control Foundations and Trends R in Networking Vol. 2, No. 3 (2007) 271 379 c 2008 S. Shakkottai and R. Srikant DOI: 10.1561/1300000007 Network Optimization and Control Srinivas Shakkottai 1 and R. Srikant 2 1

More information

Impact of size-based scheduling on flow level performance in wireless downlink data channels

Impact of size-based scheduling on flow level performance in wireless downlink data channels Impact of size-based scheduling on flow level performance in wireless downlink data channels Samuli Aalto and Pasi Lassila TKK Helsinki University of Technology, Networking Laboratory, P.O. Box 3, FIN-25

More information

Multipath TCP: Analysis, Design and Implementation

Multipath TCP: Analysis, Design and Implementation Multipath TCP: Analysis, Design and Implementation Qiuyu Peng, Anwar Walid, Jaehyun Hwang, Steven H. Low arxiv:38.39v3 [cs.ni] 7 Dec 4 Abstract Multi-path TCP () has the potential to greatly improve application

More information

Size-based Adaptive Bandwidth Allocation:

Size-based Adaptive Bandwidth Allocation: Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows Shanchieh Yang (scyang@ece.utexas.edu), Gustavo de Veciana (gustavo@ece.utexas.edu) Department of Electrical and Computer

More information

Optimal Measurement-based Pricing for an M/M/1 Queue

Optimal Measurement-based Pricing for an M/M/1 Queue Optimal Measurement-based Pricing for an M/M/1 Queue Yezekael Hayel 1 and Bruno Tuffin 1 IRISA-INRIA Rennes, Campus universitaire de Beaulieu 3542 Rennes Cedex - FRANCE {yhayel,btuffin}@irisa.fr tel: (+33)299847134

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits Peter Jacko YEQT III November 20, 2009 Basque Center for Applied Mathematics (BCAM), Bilbao, Spain Example: Congestion

More information

A Stackelberg Network Game with a Large Number of Followers 1,2,3

A Stackelberg Network Game with a Large Number of Followers 1,2,3 A Stackelberg Network Game with a Large Number of Followers,,3 T. BAŞAR 4 and R. SRIKANT 5 Communicated by M. Simaan Abstract. We consider a hierarchical network game with multiple links, a single service

More information

Modelling an Isolated Compound TCP Connection

Modelling an Isolated Compound TCP Connection Modelling an Isolated Compound TCP Connection Alberto Blanc and Denis Collange Orange Labs 905 rue Albert Einstein Sophia Antipolis, France {Email: alberto.blanc,denis.collange}@orange-ftgroup.com Konstantin

More information

Can Shortest-path Routing and TCP Maximize Utility

Can Shortest-path Routing and TCP Maximize Utility Can Shortest-path Routing and TCP Maximize Utility Jiantao Wang Lun Li Steven H. Low John C. Doyle California Institute of Technology, Pasadena, USA {jiantao@cds., lun@cds., slow@, doyle@cds.}caltech.edu

More information

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Thesis by John Pongsajapan In Partial Fulfillment of the Requirements for the Degree of Master of Science California Institute

More information

M/G/1/MLPS compared to M/G/1/PS

M/G/1/MLPS compared to M/G/1/PS Operations Research Letters 33 (25) 519 524 Operations Research Letters www.elsevier.com/locate/orl M/G/1/MLPS compared to M/G/1/PS Samuli Aalto a,, Urtzi Ayesta b, Eeva Nyberg-Oksanen a,1 a Networking

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center

More information

THE Internet is increasingly being used in the conduct of

THE Internet is increasingly being used in the conduct of 94 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 Global Stability Conditions for Rate Control With Arbitrary Communication Delays Priya Ranjan, Member, IEEE, Richard J. La, Member,

More information

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018 Congestion Control In The Internet Part 1: Theory JY Le Boudec 2018 1 Contents 1. What is the problem; congestion collapse 2. Efficiency versus Fairness 3. Definitions of fairness 4. Additive Increase

More information

9. Dual decomposition and dual algorithms

9. Dual decomposition and dual algorithms EE 546, Univ of Washington, Spring 2016 9. Dual decomposition and dual algorithms dual gradient ascent example: network rate control dual decomposition and the proximal gradient method examples with simple

More information

On the Price of Anarchy in Unbounded Delay Networks

On the Price of Anarchy in Unbounded Delay Networks On the Price of Anarchy in Unbounded Delay Networks Tao Wu Nokia Research Center Cambridge, Massachusetts, USA tao.a.wu@nokia.com David Starobinski Boston University Boston, Massachusetts, USA staro@bu.edu

More information

A SIMPLE PARALLEL ALGORITHM WITH AN O(1/T ) CONVERGENCE RATE FOR GENERAL CONVEX PROGRAMS

A SIMPLE PARALLEL ALGORITHM WITH AN O(1/T ) CONVERGENCE RATE FOR GENERAL CONVEX PROGRAMS A SIMPLE PARALLEL ALGORITHM WITH AN O(/T ) CONVERGENCE RATE FOR GENERAL CONVEX PROGRAMS HAO YU AND MICHAEL J. NEELY Abstract. This paper considers convex programs with a general (possibly non-differentiable)

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP 384Y Project June 5, 00 Stability of Congestion Control Algorithms Using Control Theory with an application to XCP . Introduction During recent years, a lot of work has been done towards the theoretical

More information

Entropy in Communication and Chemical Systems

Entropy in Communication and Chemical Systems Entropy in Communication and Chemical Systems Jean Walrand Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720 http://www.eecs.berkeley.edu/ wlr Abstract

More information

THE prediction of network behavior is an important task for

THE prediction of network behavior is an important task for TCP Networ Calculus: The case of large delay-bandwidth product Eitan Altman, Konstantin Avrachenov, Chadi Baraat Abstract We present in this paper an analytical model for the calculation of networ load

More information

Bandwidth-Sharing in Overloaded Networks 1

Bandwidth-Sharing in Overloaded Networks 1 Bandwidth-Sharing in Overloaded Networks 1 Regina Egorova, Sem Borst, Bert Zwart E-mail: egorova@cwi.nl, sem@win.tue.nl, bertzwart@gatech.edu CWI, P.O. Box 9479, 19 GB Amsterdam, The Netherlands Dept.

More information

Network Control: A Rate-Distortion Perspective

Network Control: A Rate-Distortion Perspective Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.

More information

MASTER THESIS. Development and Testing of Index Policies in Internet Routers

MASTER THESIS. Development and Testing of Index Policies in Internet Routers Universidad del País Vasco / Euskal Herriko Unibertsitatea MASTER THESIS Development and Testing of Index Policies in Internet Routers Author: Josu Doncel Advisor: Peter Jacko Urtzi Ayesta Leioa, September

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Utility Maximization for Communication Networks with Multi-path Routing

Utility Maximization for Communication Networks with Multi-path Routing Utility Maximization for Communication Networks with Multi-path Routing Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Partially Optimal Routing

Partially Optimal Routing Partially Optimal Routing Daron Acemoglu, Ramesh Johari, and Asuman Ozdaglar May 27, 2006 Abstract Most large-scale communication networks, such as the Internet, consist of interconnected administrative

More information

Utility Maximization for Communication Networks with Multi-path Routing

Utility Maximization for Communication Networks with Multi-path Routing Utility Maximization for Communication Networks with Multi-path Routing Xiaojun Lin and Ness B. Shroff Abstract In this paper, we study utility maximization problems for communication networks where each

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

Lecture 1: Entropy, convexity, and matrix scaling CSE 599S: Entropy optimality, Winter 2016 Instructor: James R. Lee Last updated: January 24, 2016

Lecture 1: Entropy, convexity, and matrix scaling CSE 599S: Entropy optimality, Winter 2016 Instructor: James R. Lee Last updated: January 24, 2016 Lecture 1: Entropy, convexity, and matrix scaling CSE 599S: Entropy optimality, Winter 2016 Instructor: James R. Lee Last updated: January 24, 2016 1 Entropy Since this course is about entropy maximization,

More information

Strategic Properties of Heterogeneous Serial Cost Sharing

Strategic Properties of Heterogeneous Serial Cost Sharing Strategic Properties of Heterogeneous Serial Cost Sharing Eric J. Friedman Department of Economics, Rutgers University New Brunswick, NJ 08903. January 27, 2000 Abstract We show that serial cost sharing

More information

00 Is Price of Anarchy the Right Measure for Load-Balancing Games?

00 Is Price of Anarchy the Right Measure for Load-Balancing Games? 00 Is Price of Anarchy the Right Measure for Load-Balancing Games? JOSU DONCEL, LAAS-CNRS and Univ de Toulouse URTZI AYESTA, LAAS-CNRS, Universite de Toulouse, IERBASQUE - Basque Foundation for Science

More information

On the optimal trade-off between SRPT and opportunistic scheduling

On the optimal trade-off between SRPT and opportunistic scheduling On the optimal trade-off between SRPT and opportunistic scheduling Samuli Aalto Aalto University P.O.Box 13000, FIN-00076 Aalto, Finland Samuli.Aalto@tkk.fi Aleksi Penttinen Aalto University P.O.Box 13000,

More information

UC Irvine UC Irvine Previously Published Works

UC Irvine UC Irvine Previously Published Works UC Irvine UC Irvine Previously Published Works Title Throughput in processor-sharing queues Permalink https://escholarship.org/uc/item/98599m4 Journal IEEE Transactions on Automatic Control, 52(2) ISSN

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance

More information

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

Cost of Not Arbitrarily Splitting in Routing

Cost of Not Arbitrarily Splitting in Routing Cost of Not Arbitrarily Splitting in Routing Yingjie Bi and Ao Tang School of Electrical and Computer Engineering, Cornell University yb236@cornelledu, atang@ececornelledu Abstract This paper studies routing

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information